public inbox for ipfire-scm@lists.ipfire.org
 help / color / mirror / Atom feed
From: git@ipfire.org
To: ipfire-scm@lists.ipfire.org
Subject: [git.ipfire.org] IPFire 2.x development tree branch, core96, created. df00a3f1cd6a23ef48c80e431b8e472a4a340e5b
Date: Sun, 20 Dec 2015 20:23:27 +0100	[thread overview]
Message-ID: <20151220192327.91B8F21E7C@argus.ipfire.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 30662 bytes --]

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "IPFire 2.x development tree".

The branch, core96 has been created
        at  df00a3f1cd6a23ef48c80e431b8e472a4a340e5b (commit)

- Log -----------------------------------------------------------------
commit df00a3f1cd6a23ef48c80e431b8e472a4a340e5b
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Sun Dec 20 20:19:43 2015 +0100

    core96: set pakfire version to 96.

commit 54206b6e35cacf20218addcbaaaf50029afd6e69
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 19 14:12:29 2015 +0000

    curl: Fix certificate validation
    
    curl did not find the certificate bundle so that server
    certificates could not be verified.
    
    Fixes #10995
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 4d7f9a81ac575207edb6bb69f8bbea8762feab96
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 19 14:09:10 2015 +0000

    strongswan: Update to 5.3.5
    
    Also ships a fix for #853 upstream.
    
    Fixes #10998
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b84a9b078dae234641a3708fbd7c1624c0731468
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 18 23:42:15 2015 +0000

    core96: Ship updated grub
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 44fb4620ee2a314070fbf47de6cd7a6a2c7365f2
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Fri Dec 18 21:28:52 2015 +0100

    grub 2.00: Bugfix for CVE-2015-8370
    
    See: http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
    
    "A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009)
    to 2.02 (December, 2015) are affected. The vulnerability can be exploited
    under certain circumstances, allowing local attackers to bypass any kind of
    authentication (plain or hashed passwords). And so, the attacker may take
    control of the computer."
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 1e1b03d5819269184a85dc5bcc042c978666bc08
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Fri Dec 18 15:11:25 2015 +0100

    dnsmasq 2.75: latest upstream patches ;-)
    
    The neverending story continues...
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit fbcc3cb7841f10c1390550074d676ddf2afa2c1a
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Wed Dec 16 21:42:41 2015 +0100

    dnsmasq 2.75: latest upstream patches
    
    Since 'Makefile' was affected, I had to rewrite
    'dnsmasq-Add-support-to-read-ISC-DHCP-lease-file.patch', too.
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 78af2f67bba5900eb97989ed271b45a74448b457
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Thu Dec 17 11:31:30 2015 +0100

    Squid-Accounting: Bugfix & clean up data
    
    There was a Bug in the addon so that no data was displayed because of a
    typo. Additionally the computeraccounts are now filtered out of
    trafficdata collection.
    Only Proxy/AD/LDAP Accounts and IP adresses are collected.
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b42a7ec1a663b356dde786cc7eeb1bb54ddcc662
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 15 18:32:55 2015 +0000

    Rootfile update
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit d9ef106e5cb1e2476101090caeac4609a41a1906
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sun Dec 13 18:04:40 2015 +0100

    Midnight Commander 4.8.15: Update for rootfile
    
    There was a syntax file which I overlooked...
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit a8d24cee436f87939625f9506e6f84fc092f4200
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 15 13:54:04 2015 +0000

    core96: Ship rules.pl
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 306098a49811868e2ffc4e19ce8cd62f69a2e9f3
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Mon Dec 7 15:57:32 2015 +0100

    BUG10994: SNAT rules are missing the outgoing interface
    
    When creating SNAT rules, the outgoing interface is not set. As a side
    effect, traffic that should be send unnatted to a vpn tunnel can be
    natted which is a BUG.
    With this patch the SNAT rules are getting a outgoing interface
    according to the configuration. When selecting the RED Target network,
    all SNAT rules will be configured with "-o red0". Otherwise if "all" is
    selected, there is no interface in the rule, which matches all networks.
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 08729f79fb7b31326d367a74a50e372e4fb688d7
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 15 13:47:52 2015 +0000

    ramdisk: Backup ramdisks once a night
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 429524c0406baeddf270d6e2df6e5a60a410e61a
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 15 12:49:27 2015 +0000

    ntp: Prefer local clock
    
    For some reason, ntp won't use a local clock even if it is
    there and up and running. Therefore we need to "prefer" our
    only source of time.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
    Tested-by: Daniel Weismüller <daniel.weismueller(a)ipfire.org>

commit 73a000f9d1e1f43807156cfb9a9c56843330d4c6
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Tue Dec 15 00:07:10 2015 +0100

    ntp 4.2.8p4: Update for rootfile
    
    '/usr/share/ntp/lib/NTP/Util.pm' is needed for 'ntptrace'
    to run correctly
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 93d6eed9a48a509e910fb4e248a70de9cdc15f0c
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 15 12:37:16 2015 +0000

    ntp: Fix syncing with local clock
    
    This is a bug that was introduced with the latest release
    from upstream
    
    Fixes #10997
    Upstream: http://bugs.ntp.org/show_bug.cgi?id=2965
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 50923742ba537464986269c8eb3442676b315267
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sun Dec 13 18:54:25 2015 +0100

    nano: Update to 2.5.0
    
    Changelog: http://www.nano-editor.org/dist/v2.5/ChangeLog
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit c4b28466d1004bd7fdb43299e18cbfa44b2a52ae
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sun Dec 13 18:58:10 2015 +0100

    arping 2.15: Update for rootfile
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 1b169a72daae63d435ee74b7ca9f28f1813fb177
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 12 17:06:10 2015 +0000

    Speed up rootfile generation
    
    The old usage of find walked through the entire filesystem tree
    and excluded some paths from being printed. The more efficient
    solution is to skip walking through excluded directories entirely.
    
    This is a slight speedup of the build process by a few minutes.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit ca762aaf6e9e0062168b145b935171713c88d2b5
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sat Dec 12 14:10:16 2015 +0100

    arping: Update to 2.15
    
    arping: Update to 2.15
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Erik Kapfer <ummeegge(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 0909a0a1d8873ac694a3eab0c91e10e0f5cd486f
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 12 11:52:18 2015 +0000

    Update rootfiles
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b5e1360eb9ca4da5c68dd7dcea79151276003622
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 12 12:46:02 2015 +0100

    ramdisk: Remove temporary directory recursively
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 24f2144dd26388215ab204b0e48217ffa4d40bfb
Author: root <root(a)ipfire.localdomain>
Date:   Sat Dec 12 12:35:24 2015 +0100

    ramdisk: Fix copying files
    
    The shell expansion wasn't used because of the quotation marks.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit ffeaaef6182adc81f01684a98cd1f5975d22b4be
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Dec 12 09:50:19 2015 +0000

    connections.cgi: Fix page crash with IPsec connections with one subnet only
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit ea6fa9de5afc5a0d0b258ff08fe7bfbc0c6dbb30
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 11 18:48:19 2015 +0000

    core96: Ship missing libnet
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 600ac5c6573a2c942c462c0f2aa844a417da310d
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sat Dec 5 20:11:59 2015 +0100

    libnet 1.1.6: Fix for rootfile
    
    libnet 1.1.6: Fix for rootfile
    
    See: https://forum.ipfire.org/viewtopic.php?f=27&t=15377, "error with
    arping and libnet.so.1"
    Should fix: Bug #10996 / https://bugzilla.ipfire.org/show_bug.cgi?id=10996
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit db1404051fa3f84ede679969ace44c0020946a7a
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sat Dec 5 04:12:51 2015 +0100

    clamav: Update to 0.99
    
    clamav: Update to 0.99
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b7488afd894de0ca908563d4b058f7f9ed0f92fc
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 11 18:43:39 2015 +0000

    core96: Ship updated rrdtool
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 4955d7239b2d42347a246d610eaf294f7ab4966d
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Sat Dec 5 04:08:49 2015 +0100

    rrdtool: Update to 1.5.5
    
    rrdtool: Update to 1.5.5
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit db7d2b13124e5388214f55564c6eab36373ed125
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Thu Dec 3 19:09:45 2015 +0100

    Midnight Commander: Update to 4.8.15
    
    Removed uncognized option: --with-samba
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit e0eb23de56d5a207d755ea8380f9f5e2abfbaace
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 10 16:38:36 2015 +0000

    core96: Ship routing.cgi
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 1e656e8adccae48639e3ce66a50b85017cadf75b
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Mon Dec 7 14:36:31 2015 +0100

    BUG10993: fix errormessage when editing static routes
    
    When editing existing static routes and clicking on apply button, there
    was an errormessage saying that this route is already in use.
    Now the errormessage is only displayed if a new route has the same ip
    than an existing one.
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b1372c3befd4ba4541fad1a90200ae7c1628ff00
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 10 16:35:09 2015 +0000

    dma: Import patch for better authentication
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit e46f7c44ca3bc0f2eb42692866294ed6924e65e1
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 22:22:55 2015 +0000

    Update translations
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 24f05f327190bb245a11ca6d9a726f6c6d7cdfcb
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 22:22:41 2015 +0000

    Update rootfiles
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 688a79a45e8b145561a26791b8f762bd046589fe
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 22:13:44 2015 +0000

    libpri: Honour CFLAGS
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b51ffa68db18e26d0a7ee25334ebe608c3fcfe94
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 22:11:28 2015 +0000

    openvmtools: Update to version 10.0.5
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 2b163f4497855bc56d00a8cc626c669517e8b95d
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:41:56 2015 +0000

    Drop tripwire
    
    This add-on is likely to be unused
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 74e43e149346a5bffb7d6c6ca91d5442d297659b
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:38:05 2015 +0000

    xtables-addons: Make sure kernel module directory exists
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 5b2155bfdd1de0553f88c7a19a15e355e74c8001
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:32:58 2015 +0000

    Drop cryptodev
    
    This module isn't used by openssl any more and therefore
    quite unnecessary.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 5b2e3ab6830ac81b3678b3e3b6c9372ed4f60ff9
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:18:11 2015 +0000

    mISDNuser: Don't build with -Werror
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit e31708279ac112ac0b0c7dc912765e1977e6cd22
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:17:27 2015 +0000

    liboping: Don't build with -Werror
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit fb39daffef9dc7396d65b6b2da0b73d6f625eabb
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 22:17:51 2015 +0000

    core96: Ship updated mdadm
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 5c424125051c9fbacfe1a2293168bbd36ec135aa
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:15:18 2015 +0000

    mdadm: Update to 3.3.4
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit a5ba61b89b9bcc818fb3f856ae44f4234680e07e
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Dec 4 21:14:47 2015 +0000

    ebtables: Honour CFLAGS
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit c7762365dc67c671b79e8869b617ad2e316bcce5
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 16:59:48 2015 +0000

    openssl: Update to 1.0.2e
    
    OpenSSL Security Advisory [3 Dec 2015]
    =======================================
    
    NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
    0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
    PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.
    
    BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
    ==================================================================
    
    Severity: Moderate
    
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
    EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
    as a result of this defect would be very difficult to perform and are not
    believed likely. Attacks against DH are considered just feasible (although very
    difficult) because most of the work necessary to deduce information
    about a private key may be performed offline. The amount of resources
    required for such an attack would be very significant and likely only
    accessible to a limited number of attackers. An attacker would
    additionally need online access to an unpatched system using the target
    private key in a scenario with persistent DH parameters and a private
    key that is shared between multiple clients. For example this can occur by
    default in OpenSSL DHE based SSL/TLS ciphersuites.
    
    This issue affects OpenSSL version 1.0.2.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2e
    
    This issue was reported to OpenSSL on August 13 2015 by Hanno
    Böck. The fix was developed by Andy Polyakov of the OpenSSL
    development team.
    
    Certificate verify crash with missing PSS parameter (CVE-2015-3194)
    ===================================================================
    
    Severity: Moderate
    
    The signature verification routines will crash with a NULL pointer dereference
    if presented with an ASN.1 signature using the RSA PSS algorithm and absent
    mask generation function parameter. Since these routines are used to verify
    certificate signature algorithms this can be used to crash any certificate
    verification operation and exploited in a DoS attack. Any application which
    performs certificate verification is vulnerable including OpenSSL clients and
    servers which enable client authentication.
    
    This issue affects OpenSSL versions 1.0.2 and 1.0.1.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2e
    OpenSSL 1.0.1 users should upgrade to 1.0.1q
    
    This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
    (Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
    development team.
    
    X509_ATTRIBUTE memory leak (CVE-2015-3195)
    ==========================================
    
    Severity: Moderate
    
    When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
    memory. This structure is used by the PKCS#7 and CMS routines so any
    application which reads PKCS#7 or CMS data from untrusted sources is affected.
    SSL/TLS is not affected.
    
    This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2e
    OpenSSL 1.0.1 users should upgrade to 1.0.1q
    OpenSSL 1.0.0 users should upgrade to 1.0.0t
    OpenSSL 0.9.8 users should upgrade to 0.9.8zh
    
    This issue was reported to OpenSSL on November 9 2015 by Adam Langley
    (Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
    Henson of the OpenSSL development team.
    
    Race condition handling PSK identify hint (CVE-2015-3196)
    =========================================================
    
    Severity: Low
    
    If PSK identity hints are received by a multi-threaded client then
    the values are wrongly updated in the parent SSL_CTX structure. This can
    result in a race condition potentially leading to a double free of the
    identify hint data.
    
    This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
    listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
    and has not been previously fixed in an OpenSSL 1.0.0 release.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2d
    OpenSSL 1.0.1 users should upgrade to 1.0.1p
    OpenSSL 1.0.0 users should upgrade to 1.0.0t
    
    The fix for this issue can be identified in the OpenSSL git repository by commit
    ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).
    
    The fix was developed by Dr. Stephen Henson of the OpenSSL development team.
    
    Note
    ====
    
    As per our previous announcements and our Release Strategy
    (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
    1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
    versions will be provided after that date. In the absence of significant
    security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
    releases will be the last for those versions. Users of these versions are
    advised to upgrade.
    
    References
    ==========
    
    URL for this Security Advisory:
    https://www.openssl.org/news/secadv/20151203.txt
    
    Note: the online version of the advisory may be updated with additional
    details over time.
    
    For details of OpenSSL severity classifications please see:
    https://www.openssl.org/about/secpolicy.html
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 228bec09bf8245e03193d8d69a0999c7059ac915
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 16:34:59 2015 +0000

    ramdisk: Migrate everything during the update
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 6146d1904aad28f0bacbb6986205c28bb7020356
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 16:03:29 2015 +0000

    ramdisk: Avoid copying data if no ramdisk is used
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 84c5f0d66d5312005a2c7528dbf686dc1968cd10
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 14:57:30 2015 +0000

    ramdisk: Move crontab back to disk
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit ee3dec50a36c175f0eb4f258855de27051bb76ac
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 14:41:49 2015 +0000

    ramdisk: Make usage of ramdisk configurable
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 5258a65deaba155637d44dba97958b90ed942197
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Dec 3 14:27:33 2015 +0000

    initscripts: functions: Fix indentation
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit c4a451eeadaade76900c0e8f8c6a90502473eada
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Thu Dec 3 13:14:23 2015 +0000

    Remove ramdisks for RRD databases
    
    Ramdisks are very limited in space and as new graphs
    are generated for OpenVPN N2N connections, etc. more
    space is necessary.
    
    This patch will enable ramdisks for all systems with more
    than 490M of memory and allows the user to force using
    a ramdisk on systems with less memory.
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Acked-by: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 74e5c32e19b3752e64c83a4762c7dacfee532bb6
Merge: 7fd716f e5d5819
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Dec 2 21:39:20 2015 +0100

    Merge branch 'master' into next

commit 7fd716f81c2ef856be5e69645340aebc7d4d6901
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 1 22:37:07 2015 +0000

    core96: Don't restart services that have not been updated
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 5a0ddc615deaf0268139c61930f9af986f9b8ba7
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Tue Dec 1 22:36:21 2015 +0000

    core96: Ship updated dnsmasq
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 40e1bbda54635bfa6d9894044b7bce603b12e855
Author: Matthias Fischer <matthias.fischer(a)ipfire.org>
Date:   Fri Nov 27 22:11:41 2015 +0100

    dnsmasq 2.75: latest upstream patches
    
    Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit e546449f6ac1203c397cd94e12a73640f35518cd
Author: Ersan Yildirim <ersan73(a)gmail.com>
Date:   Mon Nov 23 13:42:45 2015 +0000

    Update Turkish translation
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit aaf67a64c3498ab8ed0a453d433807e4b014cb0a
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Mon Nov 23 13:42:08 2015 +0000

    Update translations
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit a74ade6d9a854bd76bd7eecf59eb6954c87dffef
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Sat Nov 21 14:27:04 2015 +0000

    installer+setup: Update translations
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 0b075172af1ae899337e7f072fc8490ae57e5501
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Nov 19 12:54:41 2015 +0000

    core96: Ship changed files
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 0cf6bacad2cafcacdee5810c2a4080cb19aa85ae
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Mon Nov 16 12:01:07 2015 +0100

    BUG10984: Fix portforwardconverter for upgrades before core 77
    
    When upgrading from a post core-77 installation, the portforwarding
    rules seem to get broken. With this patch the sourceports and the
    subnetmasks from the rules are converted correctly.
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit b00797e260bc84be15cea26a144f560244be4c6e
Author: Alexander Marx <alexander.marx(a)ipfire.org>
Date:   Thu Nov 19 11:09:49 2015 +0100

    BUG10963: implement a better email verification
    
    We now check all allowed chars in the address before the @ sign.
    The domainpart after the '@' sign is just checked for valid chars, so that user(a)ipfire is valid, too
    
    Signed-off-by: Alexander Marx <alexander.marx(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 915c88931a2c5c4cd34ece5dc754cb8da984d2e3
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Thu Nov 19 12:52:31 2015 +0000

    strongswan: Update to 5.3.4
    
    Fixes a security vulnerability in the EAP-MSCHAPv2 plugin
    that is filed under CVE-2015-8023.
    
    https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 06988eaf4961be6c74a9aefb8203eb7b53157bd6
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Wed Nov 18 17:31:32 2015 +0000

    core96: Ship updated core initscript
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit c77e962d565b1ae07c9b44e3c864c9bacc9f6b78
Author: Stefan Schantl <stefan.schantl(a)ipfire.org>
Date:   Fri Oct 16 18:49:15 2015 +0200

    snort: Also monitor assigned alias addresses on red.
    
    These changes will allow snort to also inspect the traffic for
    one or more configured alias addresses, which has not been done in the past.
    
    The current situation is, that snort if enabled on red, only inspects
    the traffic which is desired to the statically configured red address.
    
    If some alias addresses have been assigned to the red interface the
    traffic to these addresses will not be checked by snort and
    completely bypasses the IDS.
    
    There is no user interaction required, nor visible-effects or any
    backward-compatiblity required, only a restart of snort after the
    update process to protect all red addresses.
    
    To do this we will now check if, the RED interface has been set to STATIC (which
    is required to use the aliases function) and any aliases have been configured. In
    case of this, the modified code will add all enabled alias addresses to the HOMENET
    variable in which snort is storing all the monitored addresses.
    
    Fixes #10619.
    
    Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit e9fbc1cecf856ccc7f5f2b2c504aa4318e879a7d
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Nov 11 22:05:15 2015 +0100

    boost: build also on x86 with -j2
    
    boost need to much memory if it was build with more
    than 2 parallel processes.
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>

commit dccbe309d2b568147c47a4d37c59b5686a7babbe
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Nov 11 15:01:13 2015 +0100

    core96: add pakfire changes to updater

commit 4e17785fc101be1bef918fe5c739a2aa8e68075c
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Nov 11 14:54:21 2015 +0100

    pakfire: remove wrong version of installed addons
    
    in the installed addon list pakfire has showed
    the latest version of the addon not the installed.
    
    Fixes: #10875
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>

commit cfac8f9476678259698b14463fdd0c1b3ffeff23
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Nov 11 14:49:02 2015 +0100

    start core96
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>

-----------------------------------------------------------------------


hooks/post-receive
--
IPFire 2.x development tree

                 reply	other threads:[~2015-12-20 19:23 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20151220192327.91B8F21E7C@argus.ipfire.org \
    --to=git@ipfire.org \
    --cc=ipfire-scm@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox